How to turn the tables on tomorrow's threat agent

How to turn the tables on tomorrow’s threat agent

Traditional security solutions worked fine when there was a strict perimeter around the corporate network, and workers only needed to access it when they were physically in the office on a corporate ...
Making sense of Zero Trust in cybersecurity.

Making sense of Zero Trust in today’s cyber climate

Unless you don’t work in the security industry, the term Zero Trust is nearly as common as malware by now–and if you haven’t heard of it before, we certainly hope you’re not ...
Modernizing Phoenix's Cybersecurity to Combat Nation-State Attacks

Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks

Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. Lawson ...
Why Zero-Trust in Video Conferencing is Crucial

Why Zero-Trust in Video Conferencing is Crucial

By now you’ve likely heard the term “zero-trust” and how it relates to cybersecurity. A few years ago, it was in more of a conceptual stage, two attached words floating about like ...
Security Boulevard
Screenshot of original infection email from Unit 42

Emotet C2 and Spam Traffic Video

This video covers a life cycle of an Emotet infection, including initial infection, command-and-control traffic, and spambot activity sending emails with malicious spreadsheet attachments to infect new victims. The video cannot be ...
Why a U.S. City Chose MixMode and Decommissioned their UBA Platform

Video: Why a U.S. City Chose MixMode and Decommissioned their UBA Platform

| | Blog, case-study, CISO, SIEM, SOC, UBA, video
MixMode’s Head of Sales and Alliances, Geoff Coulehan, shares how MixMode was able to identify critical risk factors coming from inside bad actors that had gone undetected by a large U.S. city’s ...
The Multiplying Costs and Challenges of Data Storage and Retention in Legacy Cybersecurity Platforms

VIDEO: The Multiplying costs and challenges of Data Storage and Retention in Legacy Cybersecurity Platforms

MixMode's Head of Sales and Alliances, Geoff Coulehan, discusses the data retention cost and challenges that arise when legacy cybersecurity platforms require historical data to be organized in a proprietary format for ...
What are the Limits with Rules-Based Cybersecurity Systems

Video: The Limits of Rules-BasED Cybersecurity Systems

MixMode's CTO and Chief Scientist, Dr. Igor Mezic, discusses the challenges of rules-based cybersecurity systems. He focuses on the workflow issues for security analysts that operate in first and second-wave AI (rules-based) ...
Video: Google Cloud and Cybereason Shift the XDR Paradigm to 'Detect and Anticipate'

Video: Google Cloud and Cybereason Shift the XDR Paradigm to ‘Detect and Anticipate’

Cybereason and Google Cloud recently entered into a strategic partnership to bring to market a joint solution, Cybereason XDR powered by Chronicle, in support of our joint mission to reverse the adversary ...
The Exponential Data Problem with Legacy Cybersecurity Tool Stacks

Video: The Exponential Data Problem with Legacy Cybersecurity Tool Stacks

MixMode’s Head of Sales and Alliances, Geoff Coulehan, understands first-hand the challenges current and incoming MixMode customers are facing with their unwieldy cybersecurity tool stacks ...